Search results

Show results for

Category

Showing 11 - 20 of 87
Blog
... a disciplined, mature process to discover, encode, negotiate about, measure, and optimize around your organization’s shared...
Blog
... a disciplined, mature process to discover, encode, negotiate about, measure, and optimize around your organization’s shared...
Blog
... a top cloud provider (such as Google or AWS ) in the US for three to six days, would result in $15 billion losses. Even...
Blog
... to cheer up the drivers), Annette and her team again did us proud with a tempting array of nibbles. [News flash - my...
Blog
... and security pros, etc., but are still, themselves, unsure about how to couple risk with strategy, how to compensate risk...
Blog
... caused 75,000 passengers to be stranded. A similar outage at US airline Southwest due to router failure, led to over 2000...
Blog
... development to third parties."  If you're concerned about your current IT monitoring software , talk to your...
Blog
... A few months ago I realised I felt differently about the subject of Women in Technology. Maybe it was because I’m...
Blog
... reasons than you did and will thus have different ideas about what makes code beautiful. Whether it’s a disagreement ...
Blog
... Outputs have types (pre-built configurations), created by us. Since this is going to use the built-in...